Skip to content

Commit 7fdd81a

Browse files
authored
Merge pull request #187945 from v-rajagt/sumuth
link fixed.
2 parents 2d9e59d + f60f8b4 commit 7fdd81a

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ The following are requirements for configuring the customer-managed key:
6969
* The key must be in the *Enabled* state.
7070
* The key must have [soft delete](../key-vault/general/soft-delete-overview.md) with retention period set to **90 days**.This implicitly sets the required key attribute recoveryLevel: “Recoverable”. If the retention is set to < 90 days, the recoveryLevel: "CustomizedRecoverable", which doesn't the requirement so ensure to set the retention period is set to **90 days**.
7171
* The key must have [purge protection enabled](../key-vault/general/soft-delete-overview.md#purge-protection).
72-
* If you're [importing an existing key](/rest/api/keyvault/ImportKey/ImportKey) into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
72+
* If you're [importing an existing key](/rest/api/keyvault/keys/import-key/import-key) into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
7373

7474
## Recommendations
7575

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The following are requirements for configuring the customer-managed key:
6767
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2048.
6868
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
6969
* The key must be in the *Enabled* state.
70-
* If you're [importing an existing key](/rest/api/keyvault/ImportKey/ImportKey) into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
70+
* If you're [importing an existing key](/rest/api/keyvault/keys/import-key/import-key) into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
7171

7272
## Recommendations
7373

0 commit comments

Comments
 (0)